SlideShare une entreprise Scribd logo
1  sur  28
<Infrastructure resilience, 2013 Slide 1
Infrastructure resilience
Ian Sommerville
<Infrastructure resilience, 2013 Slide 2
Resilience
• Resilience is the ability of assets, networks
and systems to anticipate, absorb, adapt to,
and recover from a disruptive event or series
of events.
• Resilience is about maintaining the continuity
of a service in the presence of disruptive
events
<Infrastructure resilience, 2013 Slide 3
<Infrastructure resilience, 2013 Slide 4
Pandemic disease
• Pandemic disease is the highest impact
risk because it potentially affects the
whole of a national infrastructure as
people become ill
<Infrastructure resilience, 2013 Slide 5
Cyber attacks
• Cyber attacks that compromise
confidentiality are not likely to have a
major impact on the availability of a
national infrastructure
• But cyber attacks that affect the control
systems are more serious
<Infrastructure resilience, 2013 Slide 6
Risk impact
• Risk impact is related to the extent of
the damage to infrastructure assets
<Infrastructure resilience, 2013 Slide 7
Impact depends on locality
• Local incidents, such as a terrorist
attack on physical infrastructure, have
limited impact because they only affect
a small part of that infrastructure
<Infrastructure resilience, 2013 Slide 8
Organisational infrastructure
• Organisations may be more vulnerable
than physical infrastructure
• Incidents that affect the organisational
infrastructure can have more significant
impact
– Organisations are less likely to be distributed
<Infrastructure resilience, 2013 Slide 9
Risk impact
• Because physical infrastructure is
distributed, failures in one part of a
physical network are localised
– A crack is discovered in one bridge but this does
not affect other bridges in the network
<Infrastructure resilience, 2013 Slide 10
Software vulnerability
• However, software control changes this
– If common elements of an infrastructure are
networked and controlled by the same software, a
failure in one element (especially a malicious
attack) can propagate throughout the network
– Large-scale failures and unavailability therefore
become possible
<Infrastructure resilience, 2013 Slide 11
Infrastructure dependencies
• All infrastructure
elements now
depend on power and
communications
• Failure and
unavailable of these
infrastructures has
the most impact
Photo: creative commons/flickr/anemoneprojectors
<Infrastructure resilience, 2013 Slide 12
Infrastructure vulnerabilities
• Limited
physical
protectio
n
<Infrastructure resilience, 2013 Slide 13
Infrastructure vulnerabilities
• Old/insecure
software
control
systems
Image: http://commons.wikimedia.org/wiki/File:SCADA_PUMPING_STATION_1.jpg
<Infrastructure resilience, 2013 Slide 14
Infrastructure vulnerabilities
• Lack of monitoring systems
• Lack of coordination across
infrastructure elements
<Infrastructure resilience, 2013 Slide 15
Infrastructure vulnerabilities
• Lack of knowledge of infrastructure
state or dependencies
• Lack of knowledge of infrastructure
demand
<Infrastructure resilience, 2013 Slide 16
Achieving resilience
<Infrastructure resilience, 2013 Slide 17
Resistance
Provide protection
against
anticipated events
or attacks
– Flood defences
– Cybersecurity
awareness© Adrian Pingstone 2005
<Infrastructure resilience, 2013 Slide 18
Resistance
• Based on previous experience and
assumptions
• Changing world or external
circumstances may mean that
assumptions are invalid
<Infrastructure resilience, 2013 Slide 19
Reliability
• Infrastructure components should be
designed to operate under a range of
(anticipated) conditions not just
‘normal’ operating conditions
<Infrastructure resilience, 2013 Slide 20
Reliability
• Components, as far as possible, should
be designed for ‘soft’, incremental rather
than catastrophic failure
<Infrastructure resilience, 2013 Slide 21
Digital and analog systems
• Digital systems are more brittle than
analog systems
• Analog systems often fail gradually;
computer-based systems often simply
crash
<Infrastructure resilience, 2013 Slide 22
Redundancy
• The network or system as a whole
should be designed so that there
are backup installations and spare
capacity available.
<Infrastructure resilience, 2013 Slide 23
Redundancy
• Examples
– Computing support should be provided by different
providers in different locations
– Diverse generation capacity for electricity
– Multiple locations for command and control
<Infrastructure resilience, 2013 Slide 24
Response and recovery
• Respond to distruptive events quickly,
limiting the damage as far as possible
and ensuring public safety
<Infrastructure resilience, 2013 Slide 25
Response and recovery
• Plan how to restore services as quickly
as possible in the event of a loss of
capability
• Business continuity planning
• Disaster recovery
<Infrastructure resilience, 2013 Slide 26
Achieving resilience
• Advance planning to draw up contingency plans to
cover anticipated problems
• (a) good design of the network and systems to
ensure it has the necessary resistance, reliability and
redundancy (spare capacity), and
• (b) by establishing good organisational resilience to
provide the ability, capacity and capability to respond
and recover from disruptive events.
<Infrastructure resilience, 2013 Slide 27
Key points
• Critical infrastructure resilience is the ability of
the infrastructure to continue to deliver
essential services during and after a
hazardous event
• Infrastructure resilience depends on planning
for contingencies and effective infrastructure
design
<Infrastructure resilience, 2013 Slide 28
Key points
• Software control of infrastructure systems
potentially increases vulnerability because the
effects of an event may not be localised
• Resilient infrastructure design is based on 4
R’s – resistance, reliability, redundancy, and
recovery

Contenu connexe

Tendances

Application of gis in natural disaster management
Application of gis in natural disaster managementApplication of gis in natural disaster management
Application of gis in natural disaster managementMuhammad Sajjad
 
Technologies for Disaster Management
Technologies for Disaster ManagementTechnologies for Disaster Management
Technologies for Disaster ManagementBrandon Greenberg
 
MICRO-ZONING AND RISK MAPPING FOR DISASTER PREPAREDNESS
MICRO-ZONING AND RISK MAPPING FOR DISASTER PREPAREDNESSMICRO-ZONING AND RISK MAPPING FOR DISASTER PREPAREDNESS
MICRO-ZONING AND RISK MAPPING FOR DISASTER PREPAREDNESSEminent Planners
 
Structural and Non strutural mitigation
Structural and  Non strutural mitigationStructural and  Non strutural mitigation
Structural and Non strutural mitigationPRAVIN PARGHI
 
Hazard, vulnerability, risk
Hazard, vulnerability, riskHazard, vulnerability, risk
Hazard, vulnerability, riskMd Asif Hasan
 
Role of government in disaster management at central tam 2013-20
Role of government in disaster management at central tam 2013-20Role of government in disaster management at central tam 2013-20
Role of government in disaster management at central tam 2013-20Vijay Kumar
 
Unit1f global disaster trends
Unit1f global disaster  trendsUnit1f global disaster  trends
Unit1f global disaster trendsDr.R. SELVAM
 
Malin Landslide : A Case study
Malin Landslide : A Case studyMalin Landslide : A Case study
Malin Landslide : A Case studyPratik Khadatare
 
Disaster management in india
Disaster management in indiaDisaster management in india
Disaster management in indiaDevyani Wanjari
 
Seismic Retrofitting Techniques
Seismic Retrofitting TechniquesSeismic Retrofitting Techniques
Seismic Retrofitting TechniquesAritra Banerjee
 
Unit no 02 dm_disaster mitigation
Unit no 02 dm_disaster mitigationUnit no 02 dm_disaster mitigation
Unit no 02 dm_disaster mitigationJaipal Dhobale
 
Module 9 introduction to disaster risk management
Module 9   introduction to disaster risk managementModule 9   introduction to disaster risk management
Module 9 introduction to disaster risk managementunapcict
 
CAPACITY BUILDING IN DISASTER MANAGEMENT
CAPACITY BUILDING IN DISASTER MANAGEMENTCAPACITY BUILDING IN DISASTER MANAGEMENT
CAPACITY BUILDING IN DISASTER MANAGEMENTAvinashAvi110
 
MULTI HAZARD AND DISASTER VULNERABILITY OF IN DIA
MULTI HAZARD AND DISASTER VULNERABILITY OF IN DIAMULTI HAZARD AND DISASTER VULNERABILITY OF IN DIA
MULTI HAZARD AND DISASTER VULNERABILITY OF IN DIAKartik Mondal
 
A Presentation on "Disaster Preparedness and Management " Presented by Mr. Sh...
A Presentation on "Disaster Preparedness and Management " Presented by Mr. Sh...A Presentation on "Disaster Preparedness and Management " Presented by Mr. Sh...
A Presentation on "Disaster Preparedness and Management " Presented by Mr. Sh...CDRN
 
ROLE OF MEDIA IN DISASTER MANAGEMENT
ROLE OF MEDIA IN DISASTER MANAGEMENTROLE OF MEDIA IN DISASTER MANAGEMENT
ROLE OF MEDIA IN DISASTER MANAGEMENTNavjeetSingh74
 

Tendances (20)

Application of gis in natural disaster management
Application of gis in natural disaster managementApplication of gis in natural disaster management
Application of gis in natural disaster management
 
Technologies for Disaster Management
Technologies for Disaster ManagementTechnologies for Disaster Management
Technologies for Disaster Management
 
MICRO-ZONING AND RISK MAPPING FOR DISASTER PREPAREDNESS
MICRO-ZONING AND RISK MAPPING FOR DISASTER PREPAREDNESSMICRO-ZONING AND RISK MAPPING FOR DISASTER PREPAREDNESS
MICRO-ZONING AND RISK MAPPING FOR DISASTER PREPAREDNESS
 
Structural and Non strutural mitigation
Structural and  Non strutural mitigationStructural and  Non strutural mitigation
Structural and Non strutural mitigation
 
Hazard, vulnerability, risk
Hazard, vulnerability, riskHazard, vulnerability, risk
Hazard, vulnerability, risk
 
Role of government in disaster management at central tam 2013-20
Role of government in disaster management at central tam 2013-20Role of government in disaster management at central tam 2013-20
Role of government in disaster management at central tam 2013-20
 
Unit1f global disaster trends
Unit1f global disaster  trendsUnit1f global disaster  trends
Unit1f global disaster trends
 
Malin Landslide : A Case study
Malin Landslide : A Case studyMalin Landslide : A Case study
Malin Landslide : A Case study
 
Disaster management in india
Disaster management in indiaDisaster management in india
Disaster management in india
 
Disaster management
Disaster managementDisaster management
Disaster management
 
Seismic Retrofitting Techniques
Seismic Retrofitting TechniquesSeismic Retrofitting Techniques
Seismic Retrofitting Techniques
 
Unit no 02 dm_disaster mitigation
Unit no 02 dm_disaster mitigationUnit no 02 dm_disaster mitigation
Unit no 02 dm_disaster mitigation
 
Module 9 introduction to disaster risk management
Module 9   introduction to disaster risk managementModule 9   introduction to disaster risk management
Module 9 introduction to disaster risk management
 
CAPACITY BUILDING IN DISASTER MANAGEMENT
CAPACITY BUILDING IN DISASTER MANAGEMENTCAPACITY BUILDING IN DISASTER MANAGEMENT
CAPACITY BUILDING IN DISASTER MANAGEMENT
 
MULTI HAZARD AND DISASTER VULNERABILITY OF IN DIA
MULTI HAZARD AND DISASTER VULNERABILITY OF IN DIAMULTI HAZARD AND DISASTER VULNERABILITY OF IN DIA
MULTI HAZARD AND DISASTER VULNERABILITY OF IN DIA
 
A Presentation on "Disaster Preparedness and Management " Presented by Mr. Sh...
A Presentation on "Disaster Preparedness and Management " Presented by Mr. Sh...A Presentation on "Disaster Preparedness and Management " Presented by Mr. Sh...
A Presentation on "Disaster Preparedness and Management " Presented by Mr. Sh...
 
Disaster Risk Reduction
Disaster Risk ReductionDisaster Risk Reduction
Disaster Risk Reduction
 
Disaster Recovery
Disaster RecoveryDisaster Recovery
Disaster Recovery
 
Risk Assessment and Reduction
Risk Assessment and ReductionRisk Assessment and Reduction
Risk Assessment and Reduction
 
ROLE OF MEDIA IN DISASTER MANAGEMENT
ROLE OF MEDIA IN DISASTER MANAGEMENTROLE OF MEDIA IN DISASTER MANAGEMENT
ROLE OF MEDIA IN DISASTER MANAGEMENT
 

En vedette

Architectural patterns for real-time systems
Architectural patterns for real-time systemsArchitectural patterns for real-time systems
Architectural patterns for real-time systemssommerville-videos
 
Cybersecurity 5 improving cybersecurity
Cybersecurity 5 improving cybersecurityCybersecurity 5 improving cybersecurity
Cybersecurity 5 improving cybersecuritysommerville-videos
 
Cybersecurity 4 security is sociotechnical issue
Cybersecurity 4 security is sociotechnical issueCybersecurity 4 security is sociotechnical issue
Cybersecurity 4 security is sociotechnical issuesommerville-videos
 
Cybersecurity 3 cybersecurity costs and causes
Cybersecurity 3 cybersecurity costs and causesCybersecurity 3 cybersecurity costs and causes
Cybersecurity 3 cybersecurity costs and causessommerville-videos
 
Cybersecurity 5 improving cybersecurity
Cybersecurity 5 improving cybersecurityCybersecurity 5 improving cybersecurity
Cybersecurity 5 improving cybersecuritysommerville-videos
 
Cybersecurity 3 cybersecurity costs and causes
Cybersecurity 3 cybersecurity costs and causesCybersecurity 3 cybersecurity costs and causes
Cybersecurity 3 cybersecurity costs and causessommerville-videos
 
Introduction to systems of systems
Introduction to systems of systemsIntroduction to systems of systems
Introduction to systems of systemssommerville-videos
 
Critical national infrastructure
Critical national infrastructureCritical national infrastructure
Critical national infrastructuresommerville-videos
 
Cybersecurity 4 security is sociotechnical issue
Cybersecurity 4 security is sociotechnical issueCybersecurity 4 security is sociotechnical issue
Cybersecurity 4 security is sociotechnical issuesommerville-videos
 
Cybersecurity 1 intro to cybersecurity
Cybersecurity 1 intro to cybersecurityCybersecurity 1 intro to cybersecurity
Cybersecurity 1 intro to cybersecuritysommerville-videos
 
User-Generated Content on Social Media
User-Generated Content on Social MediaUser-Generated Content on Social Media
User-Generated Content on Social MediaMeena Nagarajan
 
Personalized and Adaptive Semantic Information Filtering for Social Media - P...
Personalized and Adaptive Semantic Information Filtering for Social Media - P...Personalized and Adaptive Semantic Information Filtering for Social Media - P...
Personalized and Adaptive Semantic Information Filtering for Social Media - P...Artificial Intelligence Institute at UofSC
 

En vedette (20)

Infrastructure control
Infrastructure controlInfrastructure control
Infrastructure control
 
Architectural patterns for real-time systems
Architectural patterns for real-time systemsArchitectural patterns for real-time systems
Architectural patterns for real-time systems
 
Cybersecurity 5 improving cybersecurity
Cybersecurity 5 improving cybersecurityCybersecurity 5 improving cybersecurity
Cybersecurity 5 improving cybersecurity
 
Cybersecurity 4 security is sociotechnical issue
Cybersecurity 4 security is sociotechnical issueCybersecurity 4 security is sociotechnical issue
Cybersecurity 4 security is sociotechnical issue
 
Cybersecurity 3 cybersecurity costs and causes
Cybersecurity 3 cybersecurity costs and causesCybersecurity 3 cybersecurity costs and causes
Cybersecurity 3 cybersecurity costs and causes
 
Cybersecurity 5 improving cybersecurity
Cybersecurity 5 improving cybersecurityCybersecurity 5 improving cybersecurity
Cybersecurity 5 improving cybersecurity
 
Cybersecurity 3 cybersecurity costs and causes
Cybersecurity 3 cybersecurity costs and causesCybersecurity 3 cybersecurity costs and causes
Cybersecurity 3 cybersecurity costs and causes
 
Infrastructure dependability
Infrastructure dependabilityInfrastructure dependability
Infrastructure dependability
 
Maroochy water breach
Maroochy water breachMaroochy water breach
Maroochy water breach
 
Introduction to systems of systems
Introduction to systems of systemsIntroduction to systems of systems
Introduction to systems of systems
 
Critical national infrastructure
Critical national infrastructureCritical national infrastructure
Critical national infrastructure
 
Cybersecurity 4 security is sociotechnical issue
Cybersecurity 4 security is sociotechnical issueCybersecurity 4 security is sociotechnical issue
Cybersecurity 4 security is sociotechnical issue
 
Cybersecurity 1 intro to cybersecurity
Cybersecurity 1 intro to cybersecurityCybersecurity 1 intro to cybersecurity
Cybersecurity 1 intro to cybersecurity
 
System safety
System safetySystem safety
System safety
 
System success and failure
System success and failureSystem success and failure
System success and failure
 
User-Generated Content on Social Media
User-Generated Content on Social MediaUser-Generated Content on Social Media
User-Generated Content on Social Media
 
A Semantics-based Approach to Machine Perception
A Semantics-based Approach to Machine PerceptionA Semantics-based Approach to Machine Perception
A Semantics-based Approach to Machine Perception
 
Satya Sahoo Thesis Defense
Satya Sahoo Thesis DefenseSatya Sahoo Thesis Defense
Satya Sahoo Thesis Defense
 
Automatic Emotion Identification from Text
Automatic Emotion Identification from TextAutomatic Emotion Identification from Text
Automatic Emotion Identification from Text
 
Personalized and Adaptive Semantic Information Filtering for Social Media - P...
Personalized and Adaptive Semantic Information Filtering for Social Media - P...Personalized and Adaptive Semantic Information Filtering for Social Media - P...
Personalized and Adaptive Semantic Information Filtering for Social Media - P...
 

Similaire à Infrastructure resilience

Ch14 - Resilience Engineering
Ch14 - Resilience EngineeringCh14 - Resilience Engineering
Ch14 - Resilience EngineeringHarsh Verdhan Raj
 
Network Security for Computer science and Engineering.ppt
Network Security for Computer science and Engineering.pptNetwork Security for Computer science and Engineering.ppt
Network Security for Computer science and Engineering.pptAkfeteAssefa
 
Preparing for a Black Swan: Planning and Programming for Risk Mitigation in E...
Preparing for a Black Swan: Planning and Programming for Risk Mitigation in E...Preparing for a Black Swan: Planning and Programming for Risk Mitigation in E...
Preparing for a Black Swan: Planning and Programming for Risk Mitigation in E...juliekannai
 
Sayon MS Thesis Presentation Draft-4
Sayon MS Thesis Presentation Draft-4Sayon MS Thesis Presentation Draft-4
Sayon MS Thesis Presentation Draft-4Sayonsom Chanda
 
Resilience of Critical Infrastructures to Climate Change
Resilience of Critical Infrastructures to Climate ChangeResilience of Critical Infrastructures to Climate Change
Resilience of Critical Infrastructures to Climate Changeeu-circle
 
Resilience of Critical Infrastructures to Climate Change (old)
Resilience of Critical Infrastructures to Climate Change (old)Resilience of Critical Infrastructures to Climate Change (old)
Resilience of Critical Infrastructures to Climate Change (old)eu-circle
 
FAILURE FREE CLOUD COMPUTING ARCHITECTURES
FAILURE FREE CLOUD COMPUTING ARCHITECTURESFAILURE FREE CLOUD COMPUTING ARCHITECTURES
FAILURE FREE CLOUD COMPUTING ARCHITECTURESijcsit
 
Past and future of integrity based attacks in ics environments
Past and future of integrity based attacks in ics environmentsPast and future of integrity based attacks in ics environments
Past and future of integrity based attacks in ics environmentsJoe Slowik
 
Resilience Shift - overview of our programme
Resilience Shift - overview of our programmeResilience Shift - overview of our programme
Resilience Shift - overview of our programmeThe Resilience Shift
 
An Investigation of Fault Tolerance Techniques in Cloud Computing
An Investigation of Fault Tolerance Techniques in Cloud ComputingAn Investigation of Fault Tolerance Techniques in Cloud Computing
An Investigation of Fault Tolerance Techniques in Cloud Computingijtsrd
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecuritysommerville-videos
 
SMART Seminar Series: "Infrastructure Resilience: Planning for Future Extreme...
SMART Seminar Series: "Infrastructure Resilience: Planning for Future Extreme...SMART Seminar Series: "Infrastructure Resilience: Planning for Future Extreme...
SMART Seminar Series: "Infrastructure Resilience: Planning for Future Extreme...SMART Infrastructure Facility
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Cybersecurity Critical Infrastructure Threats and Examples 2022- Presentation...
Cybersecurity Critical Infrastructure Threats and Examples 2022- Presentation...Cybersecurity Critical Infrastructure Threats and Examples 2022- Presentation...
Cybersecurity Critical Infrastructure Threats and Examples 2022- Presentation...Certrec
 
Best Practices for Network Security Management
Best Practices for Network Security Management Best Practices for Network Security Management
Best Practices for Network Security Management Skybox Security
 

Similaire à Infrastructure resilience (20)

Ch14 - Resilience Engineering
Ch14 - Resilience EngineeringCh14 - Resilience Engineering
Ch14 - Resilience Engineering
 
Ch14 resilience engineering
Ch14 resilience engineeringCh14 resilience engineering
Ch14 resilience engineering
 
Network Security for Computer science and Engineering.ppt
Network Security for Computer science and Engineering.pptNetwork Security for Computer science and Engineering.ppt
Network Security for Computer science and Engineering.ppt
 
Preparing for a Black Swan: Planning and Programming for Risk Mitigation in E...
Preparing for a Black Swan: Planning and Programming for Risk Mitigation in E...Preparing for a Black Swan: Planning and Programming for Risk Mitigation in E...
Preparing for a Black Swan: Planning and Programming for Risk Mitigation in E...
 
Availability and reliability
Availability and reliabilityAvailability and reliability
Availability and reliability
 
Sayon MS Thesis Presentation Draft-4
Sayon MS Thesis Presentation Draft-4Sayon MS Thesis Presentation Draft-4
Sayon MS Thesis Presentation Draft-4
 
Resilience of Critical Infrastructures to Climate Change
Resilience of Critical Infrastructures to Climate ChangeResilience of Critical Infrastructures to Climate Change
Resilience of Critical Infrastructures to Climate Change
 
Resilience of Critical Infrastructures to Climate Change (old)
Resilience of Critical Infrastructures to Climate Change (old)Resilience of Critical Infrastructures to Climate Change (old)
Resilience of Critical Infrastructures to Climate Change (old)
 
Information Security Concepts.pdf
Information Security Concepts.pdfInformation Security Concepts.pdf
Information Security Concepts.pdf
 
FAILURE FREE CLOUD COMPUTING ARCHITECTURES
FAILURE FREE CLOUD COMPUTING ARCHITECTURESFAILURE FREE CLOUD COMPUTING ARCHITECTURES
FAILURE FREE CLOUD COMPUTING ARCHITECTURES
 
Failure Free Cloud Computing Architectures
Failure Free Cloud Computing ArchitecturesFailure Free Cloud Computing Architectures
Failure Free Cloud Computing Architectures
 
Power_Grid_Resilence.pptx
Power_Grid_Resilence.pptxPower_Grid_Resilence.pptx
Power_Grid_Resilence.pptx
 
Past and future of integrity based attacks in ics environments
Past and future of integrity based attacks in ics environmentsPast and future of integrity based attacks in ics environments
Past and future of integrity based attacks in ics environments
 
Resilience Shift - overview of our programme
Resilience Shift - overview of our programmeResilience Shift - overview of our programme
Resilience Shift - overview of our programme
 
An Investigation of Fault Tolerance Techniques in Cloud Computing
An Investigation of Fault Tolerance Techniques in Cloud ComputingAn Investigation of Fault Tolerance Techniques in Cloud Computing
An Investigation of Fault Tolerance Techniques in Cloud Computing
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
 
SMART Seminar Series: "Infrastructure Resilience: Planning for Future Extreme...
SMART Seminar Series: "Infrastructure Resilience: Planning for Future Extreme...SMART Seminar Series: "Infrastructure Resilience: Planning for Future Extreme...
SMART Seminar Series: "Infrastructure Resilience: Planning for Future Extreme...
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Cybersecurity Critical Infrastructure Threats and Examples 2022- Presentation...
Cybersecurity Critical Infrastructure Threats and Examples 2022- Presentation...Cybersecurity Critical Infrastructure Threats and Examples 2022- Presentation...
Cybersecurity Critical Infrastructure Threats and Examples 2022- Presentation...
 
Best Practices for Network Security Management
Best Practices for Network Security Management Best Practices for Network Security Management
Best Practices for Network Security Management
 

Plus de sommerville-videos

Introduction to real time software systems script
Introduction to real time software systems scriptIntroduction to real time software systems script
Introduction to real time software systems scriptsommerville-videos
 
System of systems classification
System of systems classificationSystem of systems classification
System of systems classificationsommerville-videos
 
Agile methods for large systems
Agile methods for large systemsAgile methods for large systems
Agile methods for large systemssommerville-videos
 
Agile and plan based development processes
Agile and plan based development processesAgile and plan based development processes
Agile and plan based development processessommerville-videos
 
Fundamental software engineering activities
Fundamental software engineering activitiesFundamental software engineering activities
Fundamental software engineering activitiessommerville-videos
 
Introducing Software Engineering
Introducing Software EngineeringIntroducing Software Engineering
Introducing Software Engineeringsommerville-videos
 
Stakeholders, viewpoints and concerns
Stakeholders, viewpoints and concernsStakeholders, viewpoints and concerns
Stakeholders, viewpoints and concernssommerville-videos
 
Requirements engineering processes
Requirements engineering processesRequirements engineering processes
Requirements engineering processessommerville-videos
 
Requirements engineering challenges
Requirements engineering challengesRequirements engineering challenges
Requirements engineering challengessommerville-videos
 
Introducing sociotechnical systems
Introducing sociotechnical systemsIntroducing sociotechnical systems
Introducing sociotechnical systemssommerville-videos
 

Plus de sommerville-videos (20)

Introduction to real time software systems script
Introduction to real time software systems scriptIntroduction to real time software systems script
Introduction to real time software systems script
 
System of systems classification
System of systems classificationSystem of systems classification
System of systems classification
 
Reuse landscape
Reuse landscapeReuse landscape
Reuse landscape
 
Scaling agile
Scaling agileScaling agile
Scaling agile
 
Agile methods for large systems
Agile methods for large systemsAgile methods for large systems
Agile methods for large systems
 
User stories
User storiesUser stories
User stories
 
Agile and plan based development processes
Agile and plan based development processesAgile and plan based development processes
Agile and plan based development processes
 
Fundamental software engineering activities
Fundamental software engineering activitiesFundamental software engineering activities
Fundamental software engineering activities
 
Introducing Software Engineering
Introducing Software EngineeringIntroducing Software Engineering
Introducing Software Engineering
 
Why se script
Why se scriptWhy se script
Why se script
 
Ariane 5 launcher failure
Ariane 5 launcher failure Ariane 5 launcher failure
Ariane 5 launcher failure
 
Airbus Flight Control System
Airbus Flight Control SystemAirbus Flight Control System
Airbus Flight Control System
 
Warsaw airbus accident
Warsaw airbus accidentWarsaw airbus accident
Warsaw airbus accident
 
Stakeholders, viewpoints and concerns
Stakeholders, viewpoints and concernsStakeholders, viewpoints and concerns
Stakeholders, viewpoints and concerns
 
Requirements engineering processes
Requirements engineering processesRequirements engineering processes
Requirements engineering processes
 
Requirements engineering challenges
Requirements engineering challengesRequirements engineering challenges
Requirements engineering challenges
 
Intro to requirements eng.
Intro to requirements eng.Intro to requirements eng.
Intro to requirements eng.
 
Emergent properties
Emergent propertiesEmergent properties
Emergent properties
 
Introducing sociotechnical systems
Introducing sociotechnical systemsIntroducing sociotechnical systems
Introducing sociotechnical systems
 
Critical systems engineering
Critical systems engineeringCritical systems engineering
Critical systems engineering
 

Dernier

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 

Dernier (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 

Infrastructure resilience

  • 1. <Infrastructure resilience, 2013 Slide 1 Infrastructure resilience Ian Sommerville
  • 2. <Infrastructure resilience, 2013 Slide 2 Resilience • Resilience is the ability of assets, networks and systems to anticipate, absorb, adapt to, and recover from a disruptive event or series of events. • Resilience is about maintaining the continuity of a service in the presence of disruptive events
  • 4. <Infrastructure resilience, 2013 Slide 4 Pandemic disease • Pandemic disease is the highest impact risk because it potentially affects the whole of a national infrastructure as people become ill
  • 5. <Infrastructure resilience, 2013 Slide 5 Cyber attacks • Cyber attacks that compromise confidentiality are not likely to have a major impact on the availability of a national infrastructure • But cyber attacks that affect the control systems are more serious
  • 6. <Infrastructure resilience, 2013 Slide 6 Risk impact • Risk impact is related to the extent of the damage to infrastructure assets
  • 7. <Infrastructure resilience, 2013 Slide 7 Impact depends on locality • Local incidents, such as a terrorist attack on physical infrastructure, have limited impact because they only affect a small part of that infrastructure
  • 8. <Infrastructure resilience, 2013 Slide 8 Organisational infrastructure • Organisations may be more vulnerable than physical infrastructure • Incidents that affect the organisational infrastructure can have more significant impact – Organisations are less likely to be distributed
  • 9. <Infrastructure resilience, 2013 Slide 9 Risk impact • Because physical infrastructure is distributed, failures in one part of a physical network are localised – A crack is discovered in one bridge but this does not affect other bridges in the network
  • 10. <Infrastructure resilience, 2013 Slide 10 Software vulnerability • However, software control changes this – If common elements of an infrastructure are networked and controlled by the same software, a failure in one element (especially a malicious attack) can propagate throughout the network – Large-scale failures and unavailability therefore become possible
  • 11. <Infrastructure resilience, 2013 Slide 11 Infrastructure dependencies • All infrastructure elements now depend on power and communications • Failure and unavailable of these infrastructures has the most impact Photo: creative commons/flickr/anemoneprojectors
  • 12. <Infrastructure resilience, 2013 Slide 12 Infrastructure vulnerabilities • Limited physical protectio n
  • 13. <Infrastructure resilience, 2013 Slide 13 Infrastructure vulnerabilities • Old/insecure software control systems Image: http://commons.wikimedia.org/wiki/File:SCADA_PUMPING_STATION_1.jpg
  • 14. <Infrastructure resilience, 2013 Slide 14 Infrastructure vulnerabilities • Lack of monitoring systems • Lack of coordination across infrastructure elements
  • 15. <Infrastructure resilience, 2013 Slide 15 Infrastructure vulnerabilities • Lack of knowledge of infrastructure state or dependencies • Lack of knowledge of infrastructure demand
  • 16. <Infrastructure resilience, 2013 Slide 16 Achieving resilience
  • 17. <Infrastructure resilience, 2013 Slide 17 Resistance Provide protection against anticipated events or attacks – Flood defences – Cybersecurity awareness© Adrian Pingstone 2005
  • 18. <Infrastructure resilience, 2013 Slide 18 Resistance • Based on previous experience and assumptions • Changing world or external circumstances may mean that assumptions are invalid
  • 19. <Infrastructure resilience, 2013 Slide 19 Reliability • Infrastructure components should be designed to operate under a range of (anticipated) conditions not just ‘normal’ operating conditions
  • 20. <Infrastructure resilience, 2013 Slide 20 Reliability • Components, as far as possible, should be designed for ‘soft’, incremental rather than catastrophic failure
  • 21. <Infrastructure resilience, 2013 Slide 21 Digital and analog systems • Digital systems are more brittle than analog systems • Analog systems often fail gradually; computer-based systems often simply crash
  • 22. <Infrastructure resilience, 2013 Slide 22 Redundancy • The network or system as a whole should be designed so that there are backup installations and spare capacity available.
  • 23. <Infrastructure resilience, 2013 Slide 23 Redundancy • Examples – Computing support should be provided by different providers in different locations – Diverse generation capacity for electricity – Multiple locations for command and control
  • 24. <Infrastructure resilience, 2013 Slide 24 Response and recovery • Respond to distruptive events quickly, limiting the damage as far as possible and ensuring public safety
  • 25. <Infrastructure resilience, 2013 Slide 25 Response and recovery • Plan how to restore services as quickly as possible in the event of a loss of capability • Business continuity planning • Disaster recovery
  • 26. <Infrastructure resilience, 2013 Slide 26 Achieving resilience • Advance planning to draw up contingency plans to cover anticipated problems • (a) good design of the network and systems to ensure it has the necessary resistance, reliability and redundancy (spare capacity), and • (b) by establishing good organisational resilience to provide the ability, capacity and capability to respond and recover from disruptive events.
  • 27. <Infrastructure resilience, 2013 Slide 27 Key points • Critical infrastructure resilience is the ability of the infrastructure to continue to deliver essential services during and after a hazardous event • Infrastructure resilience depends on planning for contingencies and effective infrastructure design
  • 28. <Infrastructure resilience, 2013 Slide 28 Key points • Software control of infrastructure systems potentially increases vulnerability because the effects of an event may not be localised • Resilient infrastructure design is based on 4 R’s – resistance, reliability, redundancy, and recovery

Notes de l'éditeur

  1. Maybe I need a slide on each of these.